Sciweavers

861 search results - page 151 / 173
» Predicting Attack-prone Components
Sort
View
EMSOFT
2008
Springer
13 years 8 months ago
On the interplay of dynamic voltage scaling and dynamic power management in real-time embedded applications
Dynamic Voltage Scaling (DVS) and Dynamic Power Management (DPM) are two popular techniques commonly employed to save energy in real-time embedded systems. DVS policies aim at red...
Vinay Devadas, Hakan Aydin
HVEI
2010
13 years 7 months ago
Preference for art: similarity, statistics, and selling price
Factors governing human preference for artwork have long been studied but there remain many holes in our understanding. Bearing in mind contextual factors (both the conditions und...
Daniel J. Graham, Jay D. Friedenberg, Cyrus H. McC...
BMCBI
2010
136views more  BMCBI 2010»
13 years 7 months ago
A hub-attachment based method to detect functional modules from confidence-scored protein interactions and expression profiles
Background: Many research results show that the biological systems are composed of functional modules. Members in the same module usually have common functions. This is useful inf...
Chia-Hao Chin, Shu-Hwa Chen, Chin-Wen Ho, Ming-Tat...
BMCBI
2008
134views more  BMCBI 2008»
13 years 7 months ago
Stability analysis of mixtures of mutagenetic trees
Background: Mixture models of mutagenetic trees are evolutionary models that capture several pathways of ordered accumulation of genetic events observed in different subsets of pa...
Jasmina Bogojeska, Thomas Lengauer, Jörg Rahn...
BMCBI
2006
137views more  BMCBI 2006»
13 years 7 months ago
INTEGRATOR: interactive graphical search of large protein interactomes over the Web
Background: The rapid growth of protein interactome data has elevated the necessity and importance of network analysis tools. However, unlike pure text data, network search spaces...
Aaron N. Chang, Jason McDermott, Zachary Frazier, ...